Flashcards in Glossary- K Deck (26):
See encryption key.
A physical access control system where personnel are able to enter a workspace by waving a keycard near a reader or inserting it into a reader, activating a door lock to briefly unlock the door.
Any unauthorized disclosure or damage to an encryption key. See also key management.
The policies, processes, and procedures regarding the management of keys. See also key management.
The process of decommissioning encryption keys. See also key management.
A technique that is used by two parties to establish a symmetric encryp-
tion key when no secure channel is available.
A short sequence of characters that is used to authenticate a public key.
The initial generation of an encryption key. See also key management.
This refers to the size (measured in bits) of an encryption key. Longer en- cryption keys mean that it takes greater effort to successfully attack a cryptosystem.
A hardware device or a type of malware where a user’s keystrokes and, op- tionally, mouse movements and clicks are recorded and sent to the key logger’s owner.
The various processes and procedures used by an organization to generate, protect, use, and dispose of encryption keys over their lifetime.
All means used to protect encryption keys from unauthorized disclo- sure and harm. See also key management.
The process of issuing a new encryption key and re-encrypting data pro- tected with the new key. See also key management.
An incident that has been seen before and its root cause is known.
A portable computer used by an individual user.
Layer 2 Tunneling Protocol (L2TP)
A TCP/IP tunneling protocol.
layer 3 switch
A device that routes packets between different TCP/IP networks.
layer 4 switch
A device used to route packets to destinations based on TCP and UDP port numbers.
layer 4-7 switch
A device that routes packets to destinations based on their internal content.
The concept where an individual user should have the lowest privilege possible that will still enable them to perform their tasks.
Lightweight Directory Access Protocol (LDAP)
A TCP/IP application layer protocol used as a directory service for people and computing resources.
Layer 1 of the TCP/IP network model. The purpose of the link layer is the delivery of messages (usually called frames) from one station to another on a local network. See also TCP/IP network model.
local area network (LAN)
A network that connects computers and devices together in a small building or a residence.
A set of instructions that is designed to perform some damaging action when a specific event occurs; a popular example is a time bomb that alters or destroys data on a specified date in the future.
logical network architecture
The part of network architecture concerned with the depiction of network communications at a local, campus, regional, and global level.